An authorization mechanism for a relational database system
ACM Transactions on Database Systems (TODS)
An authorization model for a shared data base
SIGMOD '75 Proceedings of the 1975 ACM SIGMOD international conference on Management of data
An experimental application of cryptography to a remotely accessed data system
ACM '72 Proceedings of the ACM annual conference - Volume 1
ACM SIGMIS Database
Definition and evaluation of access rules in data management systems
VLDB '75 Proceedings of the 1st International Conference on Very Large Data Bases
Views, authorization, and locking in a relational data base system
AFIPS '75 Proceedings of the May 19-22, 1975, national computer conference and exposition
Evaluation of access authorization characteristics of derived data sets
SIGFIDET '71 Proceedings of the 1971 ACM SIGFIDET (now SIGMOD) Workshop on Data Description, Access and Control
Hi-index | 0.00 |
Four primary dimensions of the access control problem are identified. They are: 1) the physical level at which to apply control; 2) the fineness of distinction applied to the term "access" 3) the meaning of the term "user identification" 4) the degree of sophistication employed in automatically assigning sensitivity descriptions to derived data sets. Within the context of MacAIMS, the Project MAC Advanced Interactive Management System, the design of an access control system is presented which takes positions along these dimensions appropriate for controlling access in a Management Decision System. Particular attention is given to computing access characteristics of new data sets derived from existing sets. In addition, several classes of problems which the system cannot solve are presented.